Regulations for Access to and Use of the Guest Network at Ringberg Castle (Institute)

1. Area of application

(1) These regulations apply both to non-Institute computers which have access to the

guest network as well as to computer facilities made available by the Institute and used

to access the guest network. Computers which are not the property of the Institute may

only be connected to the guest network with the permission of the Institute.

(2) All users of guest networks are obliged to comply with these regulations, irrespective

of their legal relationship with the Max Planck Society (MPS).

2. Access rights

(1) There is no legal entitlement to access guest networks or use computer facilities

made available by the Institute and connected to the Institute guest network.

(2) Users who breach these regulations are liable to have their right of access

permanently or temporarily withdrawn or subsequently restricted. Persons concerned will

be afforded an opportunity to respond before access is withdrawn.

3. Duties of users

(1) Users shall refrain from any and all unlawful acts (e.g. downloading or uploading

material that is protected by copyright). In addition users shall refrain from any and all

acts that are likely to prejudice the interests or reputation of the MPS or third parties or

otherwise cause harm to the MPS or third parties (e.g. downloading or uploading

pornography).

(2) The computer facilities made available by the Institute must be treated with care. It

is prohibited to make any changes to the installation or configuration of computers and

networks or manipulate the hardware or interfere in any way with the software

installation. In the event of functional defects or serious faults, the IT department must

be notified immediately.


(3) Users are obliged to install an up-to-date virus scanner and a firewall to protect their

non-Institute computers against malware. Users must provide proof of such protection on

request. Where necessary the IT department will provide appropriate software protection

within the meaning of Sentence 1 of this Paragraph.


(4) Users are obliged to use their non-Institute computers on the network solely via the

guest log-in approved in conjunction with their rights of access. This log-in must not be

disclosed for use by third parties. Similarly the guest network may only be accessed from

computers made available by the Institute via the guest log-in approved in conjunction

with the right of access, or in the configuration specified by the Institute.


(5) Users are in particular obliged

a) to use the guest network solely in accordance with these regulations;

b) to refrain from any action likely to interfere with due and proper operation;

c) to refrain from using chargeable services at the expense of the MPS;

d) not to offer any services that may be accessed via the Internet;

e) to observe the legal/contractual requirements to protect the rights of third parties

when using the guest network; it is in particular prohibited to use of peer-to-peer

services, file hosting/share hosting or Usenet services to distribute or download content

that is protected by copyright;f) to observe the provisions of the law, in particular criminal law, copyright legislation

and regulations for the protection of minors.


4. Logging and analysis

(1) The following user data are logged: User ID and/or MAC address, IP addresses of

sender and recipient, types of services used (e.g. http, ftp, telnet) and timestamp. Logs

are retained for a period of two months. However this period will be extended if there are

grounds to suspect any misuse of the guest network. In such case the requisite logs will

be retained until such suspicion has been clarified and investigations completed.


(2) Where necessary the data logs will be analysed for the following purposes

to guarantee due and proper system operation;

b) for resource planning and system administration purposes;

c) to protect the personal data of other users;

d) for billing purposes;

e) to identify and eliminate faults;

f) to combat misuse if there is evidence that the guest network is being or has been used

in contravention of these regulations.


5. Liability of users

Users shall be liable for any loss, damage or detriment suffered by the MPS either as a

result of their improper or unlawful use of the guest network – whether via a non-

Institute computer or via computer facilities made available by the Institute - or due to a

negligent failure on the part of users to fulfil their obligations arising from these

regulations.


(2) Users shall be liable for any acts committed by third parties insofar as the user shall

have facilitated the same as a result of a negligent breach of these regulations.


(3) Users shall not however be liable for compensation pursuant to Paras. 1 and 2

provided that they have taken commensurate care in complying with these regulations

and the loss or impairment would have occurred even despite this care.


(4) Users must indemnify the MPS against all claims made by third parties against the

MPS as a result of a negligent breach of the obligations arising from these regulations.


(5) In the event that notice is given by the MPS to cease and desist on pain of

prosecution, this shall also include the imposition of such contractual penalty as shall be

due in the event of conduct pursuant to Paras. 1 and 2.


(6) The MPS reserves the right to take legal action against users who breach the terms of

these regulations.


6. Limited liability on the part of the Max Planck Institute

(1) No liability is assumed for access to the guest network, irrespective of whether via a

non-Institute computer or via computer facilities made available by the Institute. In

particular, there is no expressed or implied guarantee that the guest network will be

available at all times, either in full or without defect.


(2) The Institute shall not be liable for any loss or damage – whether direct or indirect –

in connection with such use other than in the event of wilful or gross negligence on the

part of the Institute. Limited liability does not apply in case of loss of life, physical injury

or impairment of health as a result of a negligent breach of duty on the part of the

Institute or a wilful or negligent breach of duty by a legal representative or vicarious

agent of the Institute.

 
loading content